Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Code integrity

Code integrity is a measurement used in software testing. It measures the how high is the source code's quality when it is passed on to the QA, and… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Taint tracking has been successfully deployed in a range of security applications to track data dependencies in hardware and… Expand
  • figure 2
  • table 1
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Many smartphones now deploy conventional operating systems, so the rootkit attacks so prevalent on desktop and server systems are… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Abstract : Over the past few years, virtualization has been employed to environments ranging from densely populated cloud… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Integrity measurement is a key issue in building trust in distributed systems. A good solution to integrity measurement has to… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Protecting the kernel of an operating system against attacks, especially injection of malicious code, is an important factor for… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We propose SecVisor, a tiny hypervisor that ensures code integrity for commodity OS kernels. In particular, SecVisor ensures that… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or… Expand
  • table 1
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We propose a primitive, called Pioneer, as a first step towards verifiable code execution on untrusted legacy hosts. Pioneer does… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
Computer security becomes increasingly important with continual growth of the number of interconnected computing platforms… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?